STUBBING SYSTEMS AND METHODS IN A DATA REPLICATION ENVIRONMENT
4 Assignments
0 Petitions
Accused Products
Abstract
Stubbing systems and methods are provided for intelligent data management in a replication environment, such as by reducing the space occupied by replication data on a destination system. In certain examples, stub files or like objects replace migrated, de-duplicated or otherwise copied data that has been moved from the destination system to secondary storage. Access is further provided to the replication data in a manner that is transparent to the user and/or without substantially impacting the base replication process. In order to distinguish stub files representing migrated replication data from replicated stub files, priority tags or like identifiers can be used. Thus, when accessing a stub file on the destination system, such as to modify replication data or perform a restore process, the tagged stub files can be used to recall archived data prior to performing the requested operation so that an accurate copy of the source data is generated.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method of managing the storage of data in a computer network, the method comprising:
-
receiving data at a destination system comprising computer hardware including one or more processors, the data comprising at least one first stub file; storing the data at a destination storage device included with the destination system; identifying a first portion of the data for storage at a secondary storage device; providing a copy of the first portion of the data for storage in the secondary storage device; replacing the first portion of the data at the destination storage device with a second stub file; and storing an identifier associated with the second stub file that distinguishes the second stub file from any of the at least one first stub file, wherein the second stub file comprises information sufficient to determine a location of the copy of the first portion of the data on the secondary storage device. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for managing the storage of data in a computer network, the system comprising:
computer hardware configured to execute a data manager, the data manager configured to; scan data located at a destination storage device to identify a first portion of the data to store at a secondary storage device, the data comprising at least a first stub file indicative of a portion of the data stored at a storage device that differs from the destination storage device and the secondary storage device; provide a copy of the first portion of the data for storage in the secondary storage device; and replace the first portion of the data at the destination storage device with a second stub file indicative of a location of the copy of the first portion of the data on the secondary storage device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
21. Non-transitory computer storage comprising instructions which, when executed, cause the computing system to perform steps comprising:
-
receiving data at a first system comprising computer hardware including one or more processors, the data comprising a first stub file; storing the data at a first storage device included with the first system; identifying a first portion of the data for storage at a second storage device; providing a copy of the first portion of the data for storage in the second storage device; replacing the first portion of the data at the first storage device with a second stub file; and storing an identifier that distinguishes the second stub file from the first stub file, wherein the second stub file comprises information sufficient to determine a location of the copy of the first portion of the data on the second storage device.
-
Specification